- Electrical and Electronic Engineering - Research Publications
Electrical and Electronic Engineering - Research Publications
Permanent URI for this collection
2 results
Filters
Reset filtersSettings
Statistics
Citations
Search Results
Now showing
1 - 2 of 2
-
ItemNonlinear Sampled-Data SystemsNesic, D ; Postoyan, R ; Baillieul, J ; Samad, T (Springer International Publishing, 2021)Sampled-data systems are control systems in which the feedback law is digitally implemented via a computer. They are prevalent nowadays due to the numerous advantages they offer compared to analog control. Nonlinear sampled-data systems arise in this context when either the plant model or the controller are nonlinear. While their linear counterpart is now a mature area, nonlinear sampled-data systems are much harder to deal with and, hence, much less understood. Their inherent complexity leads to a variety of methods for their modeling, analysis and design. A summary of these methods is presented in this article.
-
ItemSecure Networked Control Systems Design Using Semi-homomorphic EncryptionLin, Y ; Farokhi, F ; Shames, I ; Nešić, D ; Ferrari, RMG ; Teixeira, AMH (Springer, 2021-01-01)A secure and private nonlinear networked control systems (NCSs) design using semi-homomorphic encryption is studied. Static feedback controllers are used and network architectures are provided to enable control signal computation using encrypted signals directly. As a result, the security of the NCSs is further enhanced by preserving the privacy of information flowing through the whole network. Whereas in traditional encryption techniques, encrypted signals are decrypted before control computation and are encrypted again after computation for transmission. While this is highly desirable from privacy point of view, additional technical difficulties in the design and analysis of NCSs are induced compared to standard NCSs. In this chapter, we provide sufficient conditions on the encryption parameters that guarantee robust stability of the NCS in the presence of disturbances in a semi-global practical sense and discuss the trade-offs between the required computational resources, security guarantees, and the closed-loop performance. The proof technique is based on Lyapunov methods.